This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author r.david.murray
Recipients r.david.murray, socketpair, vstinner
Date 2016-05-30.23:57:43
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1464652663.15.0.205967385871.issue23459@psf.upfronthosting.co.za>
In-reply-to
Content
You can currently call os.execve with a file pointer.  How is that different from adding an execveat with AS_EMPTY_PATH, functionally?  I think we don't need to add this syscall, because it is intended to allow more robust implementation of fexecve, and we are already effectvely exposing fexecve.  We should be able to assume that glibc will switch to using execveat under the hood, and not worry about it ourselves.  If that's not true, then we can revisit this.
History
Date User Action Args
2016-05-30 23:57:43r.david.murraysetrecipients: + r.david.murray, vstinner, socketpair
2016-05-30 23:57:43r.david.murraysetmessageid: <1464652663.15.0.205967385871.issue23459@psf.upfronthosting.co.za>
2016-05-30 23:57:43r.david.murraylinkissue23459 messages
2016-05-30 23:57:43r.david.murraycreate